메뉴 건너뛰기




Volumn , Issue , 2006, Pages 219-222

Cross-layer cooperation to handle MAC misbehavior in ad hoc networks

Author keywords

Ad hoc networks; MAC; Security

Indexed keywords

MEDIUM ACCESS CONTROL; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ROUTING; NETWORK SECURITY;

EID: 39049146012     PISSN: 08407789     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCECE.2006.277468     Document Type: Conference Paper
Times cited : (4)

References (9)
  • 1
    • 39049117684 scopus 로고    scopus 로고
    • IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
    • IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
  • 2
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol
    • June
    • S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In Proc. of MOBIHOC, June 2002.
    • (2002) Proc. of MOBIHOC
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 3
    • 10744223024 scopus 로고    scopus 로고
    • Cross-layering in mobile ad hoc network design
    • M. Conti, G. Maselli, G. Turi, and S. Giordano. Cross-layering in mobile ad hoc network design. IEEE Computer, 37(2):48-51, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.2 , pp. 48-51
    • Conti, M.1    Maselli, G.2    Turi, G.3    Giordano, S.4
  • 4
    • 33747325673 scopus 로고    scopus 로고
    • Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
    • August
    • L. Guang and C. Assi. Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In Proc. of ACM/IEEE WiMob, August 2005.
    • (2005) Proc. of ACM/IEEE WiMob
    • Guang, L.1    Assi, C.2
  • 5
    • 33750911757 scopus 로고    scopus 로고
    • Mitigating smart selfish MAC misbehavior in ad hoc networks
    • June
    • L. Guang and C. Assi. Mitigating smart selfish MAC misbehavior in ad hoc networks. In Proc. of IEEE WiMob, June 2006.
    • (2006) Proc. of IEEE WiMob
    • Guang, L.1    Assi, C.2
  • 6
    • 85141903349 scopus 로고    scopus 로고
    • A self-adaptive detection system for MAC misbehavior in ad hoc networks
    • June
    • L. Guang and C. Assi. A self-adaptive detection system for MAC misbehavior in ad hoc networks. In Proc. of IEEE ICC, June 2006.
    • (2006) Proc. of IEEE , vol.199
    • Guang, L.1    Assi, C.2
  • 7
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsous. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of MILCOM, 2002.
    • (2002) Proc. of MILCOM
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsous, M.3
  • 8
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • September/October
    • P. Kyasanur and N. Vaidya. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing., 4(5):502-516, September/October 2005.
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.5 , pp. 502-516
    • Kyasanur, P.1    Vaidya, N.2
  • 9
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots
    • June
    • M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots. In Proc. of ACM MobiSys, June 2004.
    • (2004) Proc. of ACM MobiSys
    • Raya, M.1    Hubaux, J.P.2    Aad, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.